Pasar al contenido principal
Marketplace
Enviar comentarios
Ayuda y soporte técnico
Elementos guardados
Planes privados
Espere un momento, iniciando sesión...
Todo
Productos
Categorías
Sectores
Asociados
Filters
Clear all
Su ubicación
Su ubicación
Productos (1)
Productos (1)
Azure
Azure
Dynamics 365
Dynamics 365
Microsoft 365 (1)
Microsoft 365 (1)
Adopción y administración de los cambios
Adopción y administración de los cambios
Llamada para Microsoft Teams
Llamada para Microsoft Teams
Seguridad en la nube
Seguridad en la nube
Servicios de asesoría de cumplimiento
Servicios de asesoría de cumplimiento
Implementación y administración de dispositivos
Implementación y administración de dispositivos
Trabajadores de primera línea
Trabajadores de primera línea
Administración de identidad y acceso
Administración de identidad y acceso
Information Protection y Gobernanza
Information Protection y Gobernanza
Riesgo interno
Riesgo interno
Conocimiento e información
Conocimiento e información
Salas de reuniones para Microsoft Teams
Salas de reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Reuniones para Microsoft Teams
Microsoft 365 Live Events
Microsoft 365 Live Events
Administración de dispositivos móviles
Administración de dispositivos móviles
Power Platform for Teams
Power Platform for Teams
Soluciones personalizadas de Teams
Soluciones personalizadas de Teams
Implementación de trabajo en equipo
Implementación de trabajo en equipo
Protección contra amenazas
Protección contra amenazas
Workplace Analytics
Workplace Analytics
Power Platform
Power Platform
Sectores
Sectores
Tipo de servicio
Tipo de servicio
Modelo de precios
Modelo de precios
Consulting services results
Showing results in consulting services.
Microsoft 365 Security Readiness & Assurance Accelerator
Reliance Infosystems Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
A structured Microsoft 365 security readiness engagement that identifies, prioritises, and reduces risk across identity, devices, applications, and data — delivering audit confidence, & Clarity
1 out of 52
Hitachi Solutions – Agent 365 Governance Accelerator
Hitachi Solutions
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Establish governance, control, and operating model for AI agents using Microsoft Agent 365 to enable secure, scalable enterprise adoption.
2 out of 52
Salesforce and Microsoft Defender Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure Salesforce with Defender to detect compromised accounts, monitor exfiltration, and automate threats. Enforce Conditional Access and Sentinel. Pricing/timeline customized post-scoping.
3 out of 52
GCCH Enclave Rapid Deployment in 2 Weeks
R3
+1
Applicable to:
Cloud Security
Deploy a secure, GCCH enclave in just two weeks with a standardized approach for rapid CMMC readiness.
4 out of 52
Salesforce and OneDrive for Business Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Automate doc management by linking OneDrive files to Salesforce records securely. Cuts manual uploads, ensures version control, & maintains compliance. Pricing/timeline scoped per project.
5 out of 52
Salesforce and Microsoft Intune Integration
IT Partner LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Mobile Device Management
Secure Salesforce access with Intune. Enforce device compliance, conditional access, and data protection for CRM. Pricing and timeline customized post-scoping.
6 out of 52
Microsoft 365 E7 Envisioning by SoftwareOne
SoftwareOne
+3
Applicable to:
Adoption & Change Management
Cloud Security
Meetings for Microsoft Teams
Microsoft E7 Envisioning is a focused, advisory-led engagement that gives you a clear, defensible path to E7 adoption.
7 out of 52
Red Teaming by H One
H One (Private) Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
By H One, powered by Axiata Cyber Fusion Center (ACFC) Simulate real-world adversaries to uncover hidden vulnerabilities and strengthen your cyber resilience.
8 out of 52
Microsoft 365 Security & Compliance Assessment
Meridian Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Identity & Access Management
4-week expert-led assessment that evaluates your Microsoft 365 security posture and compliance readiness, delivering a prioritized remediation roadmap aligned with Zero Trust and regulatory framework.
9 out of 52
Entra Global Secure Access (GSA), Private Access and Internet Access proof of value
Bridewell Consulting Limited
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Experience the benefits of Entra Global Secure Access in order to build skills and the business case for adoption
10 out of 52
Enterprise‑Ready Security for Microsoft Copilot
EPAM Systems, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Secure Microsoft 365 Copilot adoption through identity, data protection, and governance readiness.
11 out of 52
Azure Migration Assessment by C1st
C1st Technologies LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The C1st Azure Migrate Assessment helps customers get started with or expand their use of Microsoft Azure and Microsoft 365 through expert migration guidance, cost visibility and modernization support
12 out of 52
HCLTech Frontline Worker Digital Experience – Assessment & Implementation support for Empowering Frontline Workers
HCL America Inc_HCLT
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
HCLTech’s solution streamlines frontline communication, digital workflows, and secure device management, powered by HCLTech, Microsoft, and Zebra for a modern, sustainable frontline workplace.
13 out of 52
Endpoint Management: 3-Day Workshop
Apex Digital Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Mobile Device Management
Begin the steps to manage and protect your devices, your apps, and your users
14 out of 52
Microsoft 365 Identity & Security: 2-Wk Assessment
PSM Partners
+2
Applicable to:
Cloud Security
Identity & Access Management
Customized identity and security assessment focused on the Microsoft 365 platform
15 out of 52
Microsoft Value Calculator: One Hour Assessment
Patriot Consulting Technology Group LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
The Cost Takeout Opportunity shows the potential cost reductions from consolidating third party solutions with Microsoft 365.
16 out of 52
Hybrid Identity and Security Expert Consulting Imp
Ravenswood Technology Group, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Ravenswood Technology Group (RTG) focuses on being a top-tier provider in Microsoft identity management, security, and data protection solutions.
17 out of 52
Big Green IT Security Assessment: 3-Week
Big Green IT - Dev
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Secure and monitor your Microsoft 365 environment to protect all of your customers data and information. Our Microsoft 365 Security Assessment provides an analysis and roadmap to securing that data.
18 out of 52
CMMC Data Enclave Dplymt: 4-Wk Implementation
C3 Integrated Solutions
+3
Applicable to:
Cloud Security
Device Deployment & Management
Identity & Access Management
Deploy Microsoft 365 to meet CMMC Requirements
19 out of 52
Microsoft 365 Security Assessment up to 6 weeks
ACTS
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
ACTS performs a Microsoft 365 security & compliance assessment delivering insights & recommendations to secure your modern workplace environment while supporting your security & initiatives.
20 out of 52
Managed Security for Compliance: 1 yr Mgd Service
Insight
+2
Applicable to:
Cloud Security
Compliance Advisory Services
Discover a turnkey solution to implement Microsoft 365 Security in your environment, achieve necessary compliance levels and continuously manage your security posture.
21 out of 52
Microsoft 365 License Optimization:1-hr Assessment
Frontier Technology, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Identity & Access Management
Review current state of Microsoft Cloud Services plans and subscriptions. Optimize to a "Cloud first" business model that is potentially more cost effective.
22 out of 52
Office 365 Security: 1-Day Assessment
Netrix Global
+1
Applicable to:
Cloud Security
Security assessment focused on analyzing the implementation of the Office 365 security toolkit using Microsoft best practices, industry standards, and Netrix's security expertise.
23 out of 52
Secure Workspace: 1 Day Workshop
Watserv Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Teamwork Deployment
A 1-day workshop designed to help companies enable their remote work scenarios – rapidly and securely. Help your team stay connected and productive without sacrificing security and control.
24 out of 52
Mail Airlift: Exchange Online Implementation
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
Our Mail Airlift engagement will get you up and running with Microsoft Exchange online in the fastest, most secure manner.
25 out of 52
Document Airlift-OneDrive Implementation
Synergy Technical, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Information Protection & Governance
Our Document Airlift will enable and configure your organization’s environment to use OneDrive for Business services in your Office 365 tenant.
26 out of 52
1-Day Security & Identity Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tailor-made Security and Identity workshop to show how Microsoft 365 can tackle most if not all of your security needs
27 out of 52
Ransomware Protection: 1 Day-Workshop
ConvergeOne
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Learn how the features in Microsoft 365 can protect you against Ransomware with a defense in depth strategy workshop
28 out of 52
Windows 365 Quick Start: 4-Day Proof of Concept
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to give you everything you need to deploy Windows 365. Included are a solution overview, planning services, as well as a proof of concept engagement
29 out of 52
Microsoft 365 Defender Threat Check: 4-wk assess
Interlink Cloud Advisors, Inc.
+2
Applicable to:
Cloud Security
Threat Protection
Evaluate security tools in the Microsoft 365 E5 bundle to reduce risk in your environment by identifying potential threats and improving your organization's security posture.
30 out of 52
Office 365 Protection: Design & Pilot 1-Wk POC
Managed Solution
+2
Applicable to:
Cloud Security
Threat Protection
Protect Your Employees from External Email Threats with Defender for Office 365 Protection
31 out of 52
Modern Identity Workshop | 4 Weeks | Workshop
Enterprise It Security
+3
Applicable to:
Cloud Security
Identity & Access Management
Insider Risk
Enable customers to understand where they are with identity management, areas for improvement, and a roadmap outlining how to get where you want to be utilizing Microsoft Azure and Microsoft 365.
32 out of 52
Microsoft 365 Security Alignment Workshop: 10 Days
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Sirius Computer Solutions will assist in evaluating how Microsoft security capabilities in the Microsoft 365 product will meet your security requirements, and achieve your desired business outcomes.
33 out of 52
Managing and Identifying Risk: 3-Day Workshop
ECF Data LLC
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
This engagement offered by ECF Data decreases insider risks by enabling the detection of malicious and inadvertent activities in your organization.
34 out of 52
Security Assessment: 2 Week Assessment
Tallan
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Tallan’s Security Assessment is an evaluation of your Azure resources, environment and business objectives to audit and develop a fresh approach to your Azure security strategy.
35 out of 52
Threat Protection and Cloud Security: 3 Day Workshop
Netwoven
+2
Applicable to:
Cloud Security
Threat Protection
Improve your security posture with a Microsoft Threat Protection Assessment Workshop
36 out of 52
Windows 365 QuickStart : 4 Day PoC + Surface Go
Synergy Technical, LLC
+3
Applicable to:
Cloud Security
Device Deployment & Management
Frontline Workers
The Windows 365 Quick Start engagement is designed to show you how Windows 365 + SurfaceGo keeps you productive. Included are a Surface Go, planning services, as well as a proof of concept.engagement
37 out of 52
Security Solutions:2-Weeks Implementation
Alpine Health Technologies Corp
+3
Applicable to:
Cloud Security
Insider Risk
Threat Protection
Discover, monitor and protect your sensitive data with multiple encryption options and advanced cyber security forensic services.
38 out of 52
CMMC Compliance: 4 week Workshop
Sirius Computer Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
The U.S. Department of Defense (DoD) is implementing the Cybersecurity Maturity Model Certification (CMMC) to verify the cybersecurity of its supply chain, our Workshop will help you ensure compliance
39 out of 52
Digital Workplace Foundations: 4-wk Assessment
Catapult Systems, LLC
+3
Applicable to:
Adoption & Change Management
Cloud Security
Teamwork Deployment
Catapult’s Digital Workplace Foundations helps you discover how Microsoft 365 can power your employee experience with an efficient platform and seamlessly integrated security and productivity tools.
40 out of 52
Microsoft 365 Implementation for Financial Service
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Paid 20 hour implementation of Microsoft 365 to include compliance policies and templates for financial services to include Exchange Online, SharePoint, OneDrive and Teams
41 out of 52
Microsoft 365 HIPAA/HITECH 20 Hour Implementation
New Charter Technologies, Inc.
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Implementation of Microsoft 365 to include compliance policies and templates for health care.
42 out of 52
Compliance Managed Services
Forsyte IT Solutions
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Organizations everywhere are experiencing the benefits of Compliance Managed Services. Work with our Microsoft Gold Partner team to establish governance and manage user access and data security.
43 out of 52
Microsoft 365 Fundamentals: 1 Day Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Teams Custom Solutions
Threat Protection
Introduction to Microsoft Azure, and you will examine the differences between Microsoft 365 & Office
44 out of 52
Microsoft 365 Identity Security Health Check: 1-Wk Assessment
ITC Secure Ltd
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Know your security vulnerabilities and get insight for Identity Security within your Microsoft 365 tenant
45 out of 52
Zero-Trust Secure Email 6wk Imp
Synergy Advisors LLC
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Secure email solution based on the latest trend in security: the Zero Trust Framework. It focuses on how users engage with technology to improve their security maturity level
46 out of 52
Microsoft Security Assessment: 3-Wk Assessment
eGroup Enabling Technologies, LLC
+3
Applicable to:
Cloud Security
Compliance Advisory Services
Information Protection & Governance
Analyze your cross platform security posture, with evaluated vulnerabilities and risks identified with a Microsoft Security Assessment.
47 out of 52
SMB Cloud Evaluation Program: 2-Wk Assessment
Maureen Data Systems
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Identifying ways to modernize & optimize IT assets, mitigate security risks, and reduce cost & complexity. See how the cloud can help, estimated costs, and what to do next.
48 out of 52
Microsoft Information Protection Administrator: 3 Days Workshop
NETCOM LEARNING
+3
Applicable to:
Cloud Security
Information Protection & Governance
Threat Protection
Microsoft Information Protection Administrator course focuses on data governance and information protection within your organization.
49 out of 52
Modern IT: 2 Hour Assessment
Modern IT
+3
Applicable to:
Adoption & Change Management
Cloud Security
Device Deployment & Management
Identify areas for business process optimization through Modern IT
50 out of 52
Zero Trust Launchpad: 3-Wk Assessment
Ascent Global, Inc.
+3
Applicable to:
Cloud Security
Identity & Access Management
Threat Protection
Ascent's Zero Trust Launchpad provides you an action plan for accelerating your portfolio of security projects in as little as 3 weeks from kickoff.
51 out of 52
Assessment-Implementation Plan for Information Protection: 3-Months Assesment
Cipher (Prosegur Ciberseguridad SL)
+3
Applicable to:
Cloud Security
Identity & Access Management
Information Protection & Governance
From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.
52 out of 52
Anterior
9
10
11
12
13